Thursday, December 1, 2016

DigiTally

Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity.



from DigiTally

Wednesday, November 30, 2016

Quantum Computing and Cybersecurity

11-27
For Karen Hurst. It is almost as if the greater the number of cybersecurity products that flood onto the market, the more intense the increase in cybercrime and cyberattacks become. There are quantifiably more breaches and incidents of compromised information assets today than there were a year ago. A lot more. The consequences are growing […]

from Quantum Computing and Cybersecurity

Paul Vixie, Compromised Security in IoT Caused by Market Pressure

via the Internet Society's blog, comes an outstanding screed - penned by Jeri Clausing - detailing the on-tar...

from Paul Vixie, Compromised Security in IoT Caused by Market Pressure

Musings About Advanced Ransomware

11-24
Advanced ransomware that historically targeted employees directly through phishing scams is now being deployed remotely through exploits of unsecured web servers running WordPress and JBoss. SamSam is one example of a ransomware strain that is targeting enterprises running vulnerable versions of JBoss. Rather than spreading a ransomware infection through phony emails or drive-by downloads, SamSam worms its […]

from Musings About Advanced Ransomware

10 Attributes of a NextGen Security Program

By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to meet dynamic demands. Since the 1980s, when security pros began to rise to combat hackers connecting through dial-in modems, technology-led approaches have left boards and executives unprepared. …

from 10 Attributes of a NextGen Security Program

Secure Data Deletion

The law of conservation of energy is that energy remains constant; it can be neither created or destroyed. It simply transforms from one form to another. While not a perfect analogy, data on a hard drive or other physical media is quite difficult to completely transform to the state of fully erased. While many have lost files and been unsuccessful in retrieving them; for an information security professional, the goal is often to ensure that the data is eliminated (sanitized is the official term) without the possibility of retrieval. Secure data deletion is the process of deleting data such…

from Secure Data Deletion

Hackers reuse passwords to access 26,500 National Lottery accounts

If you've been affected - and even if you haven't - now is a good time to stop re-using passwords

from Hackers reuse passwords to access 26,500 National Lottery accounts